The mobile revolution is changing the way organizations work and manage their operations, as well as engage with their employees. As a result, organizations are reconsidering their technologies and techniques to make their traditional organizational cultures and roles more mobile friendly, making ‘mobile first’ a must have strategy.
Pauly Comtois, Vice President of DevOps at Hearst Business Media, talks about their DevOps initiatives. What challenges have they faced? Which improvements have they seen? What lies ahead?
The adoption of containers is causing a paradigm shift within the monitoring space. InfoQ recently sat down with a series of container monitoring experts and explored the associated challenges.
Docker Containers LiveLessons aim to show what Docker containers are and how they can be used by practitioners with no previous experience with it. InfoQ has spoken with course instructor Chris Negus.
Security has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we secure our infrastructure. 1
This article demonstrates a solution for automating the build, deployment and management of a Docker Java microservices application on any cloud or virtualization platform. 1
Moving your release cadence from months to weeks is not just about learning Agile practices and getting some automation tools. It involves people, tooling and a transition plan. 2
Java performance issues are often attributable to bad database access patterns. In this article a top performance field engineer demonstrates his patterns for diagnosing database related issues.
In this article, the author looks at why developers adopt software. Instead of bombarding people with new features, successful software providers recognize that choice + speed + simplicity = adoption.
Mike Talks, Test Manager at Datacom, gave a talk at the Agile New Zealand 2015 conference on Deprogramming the Cargo Cult of Testing. Afterwards he explained why agile testing needs deprogramming 1
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
In theory, security policies protect organizations, stakeholders, and users. But in practice, organizations become more concerned with meeting these standards than protecting the business.